SlideShare une entreprise Scribd logo
1  sur  27
INFORMATION WARFARE (IW)
Dibyendu Paul
JU UGC_RC
01.09.2011
01-09-2011 JU_UGC-RC/Information_Warfare2
Stealing intelligent information…
01-09-2011 JU_UGC-RC/Information_Warfare3
IW weapons……
01-09-2011 JU_UGC-RC/Information_Warfare4
IW Tool: Social Media…
01-09-2011 JU_UGC-RC/Information_Warfare5
Media IW…….
01-09-2011 JU_UGC-RC/Information_Warfare6
Countering stronger foe…
01-09-2011 JU_UGC-RC/Information_Warfare7
WikiLeaks exposed IW…
01-09-2011 JU_UGC-RC/Information_Warfare8
WikiLeaks had to happened…
01-09-2011 JU_UGC-RC/Information_Warfare9
WikiLeaks has happened…
01-09-2011 JU_UGC-RC/Information_Warfare10
2 understanding of information…
 Information-as-data understanding, which largely
sees information as a quantity or commodity to
be stored, transmitted, used, and of course defended.
 Information-as-perception/image view, which
largely sees information in terms of its value for
shaping beliefs, perceptions, and images.
Elgin Brunner and Myriam Dunn
01-09-2011 JU_UGC-RC/Information_Warfare11
Warfare: origin….!
01-09-2011 JU_UGC-RC/Information_Warfare12
Warfare: just boom….!
01-09-2011 JU_UGC-RC/Information_Warfare13
IW: when there were no…
01-09-2011 JU_UGC-RC/Information_Warfare14
The electronic warfare…
01-09-2011 JU_UGC-RC/Information_Warfare15
Information Warfare…
From Wikipedia
 IW is a concept involving the use and management of IT in pursuit of a competitive
advantage over an opponent.
 May involve collection of tactical information, assurance(s) that one's own
information is valid, spreading of propaganda or disinformation to demoralize or
manipulate the enemy and the public, undermining the quality of opposing force
information and denial of information-collection opportunities to opposing forces.
Information warfare is closely linked to psychological warfare.
 Tends to extend into the realms of Electronic Warfare, Cyber Warfare,
Information Assurance and Computer Network Operations / Attack / Defense.
 The much broader term is "Information Operations" which, although making use of
technology, focuses on the more human-related aspects of information use,
including social network analysis, decision analysis and the human aspects of
Command and Control.
01-09-2011 JU_UGC-RC/Information_Warfare16
A journalist’s perception…
 “His dig was
directed at the
government
which introduced
the Bengali
primer in the
school curricula
recently”
01-09-2011 JU_UGC-RC/Information_Warfare17
Peoples’ perception….
01-09-2011 JU_UGC-RC/Information_Warfare18
A researcher’s perception…
01-09-2011 JU_UGC-RC/Information_Warfare19
Information from
01-09-2011 JU_UGC-RC/Information_Warfare20
Fact and perception differs…
In the IW context,
‘data’ is associated with a thing, and discriminates between
different states of the thing it describes. It consists of
attributes of the events or objects it describes.
‘knowledge’ is an attribute of a human. Knowledge is a set of
interacting mindsets about data activated by an event.
Information is the set of data filtered by the human within
the bounds of the knowledge held by that human (or
group of humans); it establishes a link between cognition
and data.
Boisot (1998)
01-09-2011 JU_UGC-RC/Information_Warfare21
Manipulation to build perception…
01-09-2011 JU_UGC-RC/Information_Warfare22
Shifting role of media…
Media is moving from sources
of information to place of
action
Clay Shirky
01-09-2011 JU_UGC-RC/Information_Warfare23
From planning to action…
Planning
Offensive Defensive
Information
Systems
Media
Other
Infrastructures
Perceptions
Actions
Human
Influance
Society
Influance
01-09-2011 JU_UGC-RC/Information_Warfare24
3 classes of Media effect….
 Agenda setting –
the ability of the media to define the significant issues
of the day.
 Priming –
the relationship between patterns of news coverage
and the criteria with which the public evaluated
politicians and celebrities.
 Framing –
the connection between qualitative features of the news
and public opinion.
01-09-2011 JU_UGC-RC/Information_Warfare25
Controlling infosphere….
 IW in the Information Age is about controlling the
‘infosphere’. It includes perceptions and information
flows at the tactical, operational and strategic level in
times of peace, tension, and war. As such, it means
controlling sources and the dissemination of
information.
 Controlling perceptions held by those in the
infosphere implies that information must be created
that favors the dominant party. As such, that
information may or may not represent physical
reality.
01-09-2011 JU_UGC-RC/Information_Warfare26
Now?…
 Librarians have long been took responsibility for the reliability of
information and protected their users from the consequences caused
by inaccurate information.
 The problem is one of verifiability, the users may not have a way to
verify whether information is accurate or inaccurate. The
verification is even more difficult with disinformation.
01-09-2011 JU_UGC-RC/Information_Warfare27
T H A N K S

Contenu connexe

Tendances

Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
kelsports
 
Presentation Causes of War
Presentation Causes of WarPresentation Causes of War
Presentation Causes of War
vwpowel
 
The Threat of Global Terrorism
The Threat of Global TerrorismThe Threat of Global Terrorism
The Threat of Global Terrorism
meducationdotnet
 

Tendances (20)

Understanding psychological warfare
Understanding psychological warfareUnderstanding psychological warfare
Understanding psychological warfare
 
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGYNATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
VMET Document
VMET DocumentVMET Document
VMET Document
 
National Security .pptx
National Security .pptxNational Security .pptx
National Security .pptx
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Deterrence
DeterrenceDeterrence
Deterrence
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorism
 
Media and Conflict Resolution
Media and Conflict ResolutionMedia and Conflict Resolution
Media and Conflict Resolution
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
Presentation Causes of War
Presentation Causes of WarPresentation Causes of War
Presentation Causes of War
 
Elements of national security by Abid Hussain
Elements of national security by Abid HussainElements of national security by Abid Hussain
Elements of national security by Abid Hussain
 
Basic class of strategic studies
Basic class of strategic studiesBasic class of strategic studies
Basic class of strategic studies
 
Soft Power Training - Indra Adnan
Soft Power Training - Indra AdnanSoft Power Training - Indra Adnan
Soft Power Training - Indra Adnan
 
Army Futures Command Concept for Intelligence 2028
Army Futures Command Concept for Intelligence 2028Army Futures Command Concept for Intelligence 2028
Army Futures Command Concept for Intelligence 2028
 
The Threat of Global Terrorism
The Threat of Global TerrorismThe Threat of Global Terrorism
The Threat of Global Terrorism
 
Cyber Warfare 4TH edition
Cyber Warfare 4TH editionCyber Warfare 4TH edition
Cyber Warfare 4TH edition
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...National Defense, International Security, & Globalization in the Post-Cold Wa...
National Defense, International Security, & Globalization in the Post-Cold Wa...
 

Similaire à Information Warfare

Creating complex information systems
Creating complex information systemsCreating complex information systems
Creating complex information systems
Anahi Iacucci
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
loganta
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
atrantham
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
Frank Smilda
 

Similaire à Information Warfare (20)

Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)Army global io 28 slides 3.2 (2011)
Army global io 28 slides 3.2 (2011)
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Intelligence Analysis
Intelligence AnalysisIntelligence Analysis
Intelligence Analysis
 
Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...
Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...
Relief Operations: How to Improve Humanitarian Systems with Smart Analytics &...
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics
 
Creating complex information systems
Creating complex information systemsCreating complex information systems
Creating complex information systems
 
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docxOSINT Forum – Week 5For this forum, you are to answer one or mor.docx
OSINT Forum – Week 5For this forum, you are to answer one or mor.docx
 
ADA531590
ADA531590ADA531590
ADA531590
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Applying citizen science model to disaster management
Applying citizen science model to disaster managementApplying citizen science model to disaster management
Applying citizen science model to disaster management
 
Sais.34.1
Sais.34.1Sais.34.1
Sais.34.1
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 

Dernier

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Dernier (20)

lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 

Information Warfare